Impact
The Linux kernel contains a deadlock bug in the NFSv4.1 state recovery path involving nfs_release_folio(). During state recovery, the kernel attempts to reclaim memory by calling nfs_release_folio(), but this call stalls because the state recovery process is also waiting to be completed. The resulting lock cycle can cause the kernel to freeze or the NFS service to become unresponsive, leading to a denial of service for clients depending on the affected server.
Affected Systems
The vulnerability is present in the Linux kernel NFS subsystem across all distributions that ship the unpatched kernel code. Any Linux installation using the affected kernel is potentially impacted.
Risk and Exploitability
The severity score of 7.0 indicates a moderate to high risk to availability. The EPSS score is less than 1 percent, suggesting that the likelihood of active exploitation is low at the present time. The vulnerability is not listed in the CISA KEV catalog. An attacker would need to trigger the NFS state recovery mechanism, which typically requires an NFS client interacting with a server that performs NFSv4.1 state recovery. Because the bug resides in kernel code, exploitation would require either local privilege escalation to the server or an exploitation vector that can provoke the deadlock.
OpenCVE Enrichment
Debian DSA